Privacy Preservation Technique for Unmanned Aerial Vehicles Network

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Muhammad Nauman Munawar, 01-247202-012
dc.date.accessioned 2023-08-03T07:31:24Z
dc.date.available 2023-08-03T07:31:24Z
dc.date.issued 2023
dc.identifier.uri http://hdl.handle.net/123456789/15887
dc.description Supervised by Dr. Ibrahim en_US
dc.description.abstract Unmanned Aerial Vehicles (UAVs) are gradually becoming more widely used across a wide range of real-world applications because of their rapid and cost-effective deployment. A UAV networks is the wireless and ad-hoc networks which facilitate from UAV to UAV and from UAV to the GC. However, it is due to the exchange of information over a wireless channel. UAVs are exposed to cyber-attacks and threats. If an UAV is compromised by the attacker, then the whole network can be compromised by the command of an attacker. He can spread false information over the network. The BRUIDS scheme relies on the rule base detection to detect the attacker. our research proposed rule base detection and anomaly the detection technique to achieve the high detection of accuracy, we will in this design and to implement a Hierarchical and Intrusion Detection and a Response Scheme (HIDRS), That will operate at the UAV and the GC level, by detect the malicious anomaly which threatened a network. In our scheme, an SVM base anomaly detection technique to verify an attack which is detected by the UAV agent and to categorize into a list (malicious, suspect, and normal). In this research, we focused on the most dangerous cyber-attack that may target the UAV networks, which are GPS spoofing, black hole, and grey hole attack. Our best simulation confirms that the scheme which we proposed is performed efficiently in-term of the attack detection and even with the high numbers of the UAVs and the attacker since it shows, a low number of false positive and the detection rate (DR) is high. en_US
dc.language.iso en en_US
dc.publisher Computer Sciences en_US
dc.relation.ispartofseries MS (IS);T-02051
dc.subject Cost-Effective Deployment en_US
dc.subject Wireless Channel en_US
dc.title Privacy Preservation Technique for Unmanned Aerial Vehicles Network en_US
dc.type MS Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account